<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Deny TCP (no connection) RST then SYN ACK in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147418#M1114441</link>
    <description>&lt;P&gt;ASA 5525x with 9.x code&lt;/P&gt;&lt;P&gt;working with an IPsec tunnel a Fortinet is on the other side of the ipsec tunnel.&lt;/P&gt;&lt;P&gt;My server on 10.220.2.16 enters the asa INSIDE interface bound down the ipsec tunnel to 10.12.32.4&lt;/P&gt;&lt;P&gt;In the asa logs my 10.220.2.16 &amp;gt;10.12.32.4 getting FLAG RST on interface INSIDE followed by a SYN ACK.&lt;/P&gt;&lt;P&gt;We don't have any asymmetrical routing no dup routes pushing traffic in core switch to different endpoints. our crypto-maps have the correct interesting traffic defined along with the proper NATS.&lt;/P&gt;&lt;P&gt;We use static routes on the core to force our tunnel traffic to the ASA. No dup routes or more specific routes pointing subnet elsewhere.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The packet tracer gives 100% flow from start to finish.&lt;/P&gt;&lt;P&gt;Suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Jul 2024 17:33:11 GMT</pubDate>
    <dc:creator>tryingtofixit</dc:creator>
    <dc:date>2024-07-19T17:33:11Z</dc:date>
    <item>
      <title>Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147418#M1114441</link>
      <description>&lt;P&gt;ASA 5525x with 9.x code&lt;/P&gt;&lt;P&gt;working with an IPsec tunnel a Fortinet is on the other side of the ipsec tunnel.&lt;/P&gt;&lt;P&gt;My server on 10.220.2.16 enters the asa INSIDE interface bound down the ipsec tunnel to 10.12.32.4&lt;/P&gt;&lt;P&gt;In the asa logs my 10.220.2.16 &amp;gt;10.12.32.4 getting FLAG RST on interface INSIDE followed by a SYN ACK.&lt;/P&gt;&lt;P&gt;We don't have any asymmetrical routing no dup routes pushing traffic in core switch to different endpoints. our crypto-maps have the correct interesting traffic defined along with the proper NATS.&lt;/P&gt;&lt;P&gt;We use static routes on the core to force our tunnel traffic to the ASA. No dup routes or more specific routes pointing subnet elsewhere.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The packet tracer gives 100% flow from start to finish.&lt;/P&gt;&lt;P&gt;Suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 17:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147418#M1114441</guid>
      <dc:creator>tryingtofixit</dc:creator>
      <dc:date>2024-07-19T17:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147424#M1114442</link>
      <description>&lt;P&gt;&lt;STRONG&gt;""logging permit-hostdown""&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;this I think&lt;/STRONG&gt; &lt;STRONG&gt;because you use tcp syslog server&amp;nbsp;&lt;BR /&gt;when the syslog not reachable the asa reject add new tcp conn&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;add command above and check&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;MHM&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 18:07:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147424#M1114442</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-19T18:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147444#M1114444</link>
      <description>&lt;P&gt;thanks! we have a troubleshooting window on monday.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 19:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147444#M1114444</guid>
      <dc:creator>tryingtofixit</dc:creator>
      <dc:date>2024-07-19T19:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147447#M1114445</link>
      <description>&lt;P&gt;Run packet capture with "trace detail" option:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/asa-using-packet-capture-to-troubleshoot-asa-firewall/ta-p/3129889" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/asa-using-packet-capture-to-troubleshoot-asa-firewall/ta-p/3129889&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;this will give you more detail on what is going..&lt;/P&gt;
&lt;P&gt;is it happening each time ? does pings work ?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 19:46:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147447#M1114445</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-19T19:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147450#M1114446</link>
      <description>&lt;P&gt;just had a chance to check, we the&amp;nbsp; logging permit-hostdown in our asa.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 19:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147450#M1114446</guid>
      <dc:creator>tryingtofixit</dc:creator>
      <dc:date>2024-07-19T19:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147537#M1114449</link>
      <description>&lt;P&gt;I have seen this issue in the past vpn-tunnel with AWS. In our case remote server and local server had some connectivity issue. The workaround work for us we have to implement TCP state bypass. Try enabling TCP state bypass for the specific traffic. This can help if the issue is related to TCP state tracking&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;access-list bypass_tcp_state extended permit ip host 10.220.2.16 host 10.12.32.4
class-map bypass_tcp_class
 match access-list bypass_tcp_state
policy-map bypass_tcp_policy
 class bypass_tcp_class
  set connection advanced-options tcp-state-bypass
service-policy bypass_tcp_policy global
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also ensure that the Fortinet device configuration matches the ASA configuration in terms of IPsec settings, NAT exemptions, and access lists. Mismatched configurations can cause issues.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 09:15:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147537#M1114449</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2024-07-20T09:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147562#M1114450</link>
      <description>&lt;P&gt;do you use Syslog with TCP or UDP ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 11:44:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5147562#M1114450</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-20T11:44:52Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5149985#M1114572</link>
      <description>&lt;P&gt;solution was needed static routes on the asa pointing to the 2nd ISP interface that ran this tunnel. traffic was getting routed out of 1st isp since it was preferred route on the asa.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 14:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5149985#M1114572</guid>
      <dc:creator>tryingtofixit</dc:creator>
      <dc:date>2024-07-24T14:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5150001#M1114574</link>
      <description>&lt;P&gt;Thanks alot for update us&lt;/P&gt;
&lt;P&gt;Have a nice summer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 14:17:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5150001#M1114574</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-24T14:17:13Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5150005#M1114575</link>
      <description>&lt;P&gt;wow good catch. was not excepted to be that issue. thanks for the update.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 14:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5150005#M1114575</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2024-07-24T14:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: Deny TCP (no connection) RST then SYN ACK</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5150021#M1114577</link>
      <description>&lt;P&gt;good catch.. usually the capture with trace detail should show you the path and give you some idea of why it is dropping a packet..&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 14:28:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-no-connection-rst-then-syn-ack/m-p/5150021#M1114577</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-24T14:28:35Z</dc:date>
    </item>
  </channel>
</rss>

